Contents Contents Page 1 Introduction Page 2 Definition of a Network Page 2 Definition of a Subnetwork Page 2 Task 1: Preparation and Planning • IP Address Scheme Page 3 Task 2: Network Design and Theory • The OSI Model Page 5 • The TCP/IP Model Page 7 • LANs, WANs and the Future Page 8 • Network Design Page 9 • Proposed Network Diagram Page 11 Task 3: Implementation and Testing • Patch Cable Construction and Testing Page 12 • Building the Network Page 13 • Testing the Network Page 15 Task 4: Structured Cabling • Site Survey Page 17 • Physical Wiring Considerations Page 17 • Tools and Skills that are Needed for …show more content…
This offers 32 hosts per subnet, but yet again the first and last host per subnet are reserved and cannot be used. This offers 30 usable hosts per subnet, which is adequate for the number of hosts on the network.) Default Gateway: 199.100.50.33. (I am going to use subnet #1. the default gateway for this subnet will be the first usable network address in the subnet, hence 199.100.50.33.) Number of Subnet Bits: 3 (2^3 = 8 – 2 = 6). Number of Host Bits: 5 (2^5 = 32 – 2 =30). Fig 1 shows the relationship of subnet bits (S) to host (H) bits in the octet. |S |S |S |H | |0 |199.100.50.0 |--- |199.100.50.31 | |1 |199.100.50.32 |199.100.50.33 - 199.100.50.62 |199.100.50.63 | |2 |199.100.50.64 |199.100.50.65 - 199.100.50.94 |199.100.50.95 | |3 |199.100.50.96 |199.100.50.97 - 199.100.50.126 |199.100.50.127 | |4 |199.100.50.128 |199.100.50.129 - 199.100.50.158
Section 1Computing Usable Subnets and Hosts vLab—40 Points Total * Task 1 * Task 2 * Summary Paragraph
37) DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve.
135.46.63.10. In binary this is 10000111.00101110.00111111.00001010. The 135.46 preface points us to one of the Interfaces on the table, which both have a subnet mask of /22. The 22 MSB's of the binary are 10000111.00101110.00111100.00000000. Back to decimal, this is 135.46.60.0, which matches Interface 1, so it is routed there.
If we take the 172.16.0.0 range, that is /12. So that means that the network mask is 255.240.0.0. If we take 256-240 = 16 we get the block size which is 16. So that means that the range is from 172.16.0.0 to 172.31.255.255 because 172.32.0.0 is the next block and would be a public IP.
It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart. In a typical LAN configuration, one computer is designated as the file server. It stores all of the software that controls the network, as well as the software that can be shared by the computers attached to the network. Computers connected to the file server are called workstations. The workstations can be less powerful than the file server, and they may have additional software on their hard drives. On many LANs, cables are used to connect the network interface cards in each computer; other LANs may be wireless.
6. A starting address of 192.0.0.0 and ending address of 223.255.255.255 is a member of which network class? Class C
2. What would be the effect of deleting the route 0.0.0.0: Why would this be a problem for routing traffic?
If you used the number of bytes instead you would get a whole different amount of possible networks which isn’t right.
You have been hired to upgrade a network of 50 computers currently connected to 10 Mbps hubs. This long-overdue upgrade is necessary because of poor network response time caused by a lot of collisions occurring during long file transfers between clients and servers. How do you recommend upgrading this network? What interconnecting devices will you use, and what benefit will you get from using these devices? Write a short memo describing the upgrade and, if possible, include a drawing of the new network.
VLSM allows an organization to use more than one subnet mask within the same network address space. It is often referred to as ‘subnetting a subnet’, and can be used to maximize addressing efficiency.
When a CPU is composed of two or more processors, each one is referred to as a(n) ________.
3 Not being a technical person, I am heavily relying on our text and other related literature. The fundamental to network addressing and numbering in an environment, despite the size or location, is following a structured model. A network designer should carefully develop, plan, manage, and document the network layer addresses. Since no accurate mechanisms exist for assigning network or subnet numbers dynamically, the network layer address numbers need to be well-planned, administered, and documented. There are benefits to observing this approach. The network will be easily managed, maintained, troubleshooting narrowed and isolated to the location, and the network will be scalable (Oppenheimer, p. 169, 2011).
Several classless routing protocol examples include OSPF, RIP version 2, Cisco 's EIGRP, BGP and IS-IS. We will deploy VLSM for this project. Use of a Class B address 172.17.0.0 is required to support a network that entails a total of 200 sites. The busiest LANs may support up to 100 hosts and there is a maximum projected total of 400 point-to-point WAN links. Hence there is a requirement for 600 subnets with a maximum of 100 hosts on any subnet. Even with a Class B address there is insufficient address space to meet this requirement without employing VLSM. When planning a VLSM solution you should start with the shortest mask in other words plan the subnets that support the most hosts. This is typically the mask that will be used on most or all of the LAN segments.
The proposed network is designed for the UMUC new building in Rockville. This new building will have some administrative offices, lecture rooms, library, and computer labs with an open Wi-Fi. This new building will have total six computer labs that will be used for instruction. Each of these labs will have 25 computers, 23 student computers and one instructor computer, one server in the closet and in addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students for doing their own purpose like homework. In Student Computer Lab there will be 30 computers and a server in the closet. There will be 10 computers for student’s use and 5 computers for Library staff in the library so they can access to the library resources for staff use, with the exception of the admissions office, which will have five computers. There will be six class room which will have a computer for instructor’s use. Finally, there will be 7 offices in the building and each of these offices will have one computer. There will be two server rooms, one on the first floor and another one on the second floor. There should be at least 3 separate networks: Administrative, Instructional, and Public. All staff-accessed computers will be on the